1 / 8

CSI-4138/CEG-4394 Design of Secure Computer Systems

CSI-4138/CEG-4394 Design of Secure Computer Systems. Virtual Election Booth Lab Project Jean-Yves Chouinard Fall 2002. Secure Election Protocol. Implementation of a secure election protocol Use of two central facilities: CTF: Central Tabulating Facility CLA: Central Legitimization Agency

tamra
Download Presentation

CSI-4138/CEG-4394 Design of Secure Computer Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CSI-4138/CEG-4394 Design of Secure Computer Systems Virtual Election Booth Lab Project Jean-Yves Chouinard Fall 2002

  2. Secure Election Protocol • Implementation of a secure election protocol • Use of two central facilities: • CTF: Central Tabulating Facility • CLA: Central Legitimization Agency • Design objectives: • secure protocol for voters to vote online • ensuring individual privacy • No possibility of cheating the election

  3. Secure Election Protocol Requirements • Only authorized voters can vote • Authorized voters can vote only once • All voters can verify that their vote has been taken into account and tabulated • No one can determine for whom anyone voted • No one can change anyone else’s vote • Everyone knows who voted and who didn’t

  4. Central Tabulating Facility and Central Legitimization Agency • The CLA certifies the voters: • Each voter sends a message to the CLA requesting a validation number. • The CLA returns a random validation number and maintains a list of validation numbers and the corresponding recipients. • The CLA sends the list of validation numbers to the CTF.

  5. Central Tabulating Facility and Central Legitimization Agency • The CTF counts the votes: • The voters sends their vote to the CTF. • The CTF checks the voters validation numbers against the list received from the CLA: if the validation number is valid then the vote is counted and the validation number disabled(to prevent multiple votes from the same voter). • After all the votes are entered, the CTF publish the election results.

  6. Term Project Report • Teams of three students • Any team member should be able to present the report and answer all questions • Detailed 15-25 page written technical report • Neat, readable and self-contained • No raw computer outputs; include only relevant program exerpts (reduced properly in size) • Include all relevant references, figures tables, diagrams, etc.

  7. Term Project Report Format • Summary (1 page): motivation, literature review, methodology used, results and general conclusion • Introduction: backgraound material, scope and limitations of the term project (secure election protocol) • Literature review, methodology: main body of the term project report • Results: description of the results (exlain all tables, figures, flow charts, block diagrams, listings, etc. • Conclusion: general conclusion, limitations, recommendations for future implementations • References: include the references used and relevant to this project: all entries must be completed • Appendices: as needed support the main body of the report

  8. References [SCHN96] Applied Cryptography: Protocols, Algorithms, and Source Code in C (2nd edition), Bruce Schneier, John Wiley and Sons, New-York, 1996. [SALO96] Public-Key Cryptography, Arto Salomaa, Springer Verlag, New-York, 1996. [STAL99] Cryptography and Network Security: Principles and Practice, William Stallings (2nd edition), Appendix A, Upper Saddle River, NJ: Prentice-Hall, 1999.

More Related